000 | 04086nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-030-91293-2 | ||
003 | DE-He213 | ||
005 | 20240423125542.0 | ||
007 | cr nn 008mamaa | ||
008 | 220402s2022 sz | s |||| 0|eng d | ||
020 |
_a9783030912932 _9978-3-030-91293-2 |
||
024 | 7 |
_a10.1007/978-3-030-91293-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCyber Security _h[electronic resource] : _bCritical Infrastructure Protection / _cedited by Martti Lehto, Pekka Neittaanmäki. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXVI, 484 p. 73 illus., 63 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aComputational Methods in Applied Sciences, _x2543-0203 ; _v56 |
|
505 | 0 | _aPart I: Digital society. Chapter 1: Cyber-attacks Against Critical Infrastructure -- Chapter 2: Key Elements of On-line Cyber Security Exercise and Survey of Learning During the On-line Cyber Security Exercise -- Chapter 3: Cyber Law and Regulation -- Chapter 4: Understanding and Gaining Human Resilience Against Negative Effects of Digitalization -- Chapter 5: Users’ Psychopathologies: Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior -- Chapter 6: Process Ontology Approach to Military Influence Operations -- Part II: Critical infrastructure protection. Chapter 7: Future Smart Societies’ Infrastructures and Services in the Cyber Environments -- Chapter 8: Cyber Security in Healthcare Systems -- Chapter 9: Cyber Security of an Electric Power System in Critical Infrastructure -- Chapter 10: Maritime Cybersecurity: Meeting Threats to Globalization’s Great Conveyor. | |
520 | _aThis book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security, legal aspects on cyber security, citizen in digital society, and cyber security training. The second part focus on the critical infrastructure protection in different areas of the critical infrastructure. The chapters cover the cybersecurity situation awareness, aviation and air traffic control, cyber security in smart societies and cities, cyber security in smart buildings, maritime cyber security, cyber security in energy systems, and cyber security in healthcare. The third part presents the impact of new technologies upon cyber capability building as well as new challenges brought about by new technologies. These new technologies are among others are quantum technology, firmware and wireless technologies, malware analysis, virtualization. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer crimes. | |
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCybercrime. |
650 | 2 | 4 | _aCyber-Physical Systems. |
700 | 1 |
_aLehto, Martti. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aNeittaanmäki, Pekka. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030912925 |
776 | 0 | 8 |
_iPrinted edition: _z9783030912949 |
776 | 0 | 8 |
_iPrinted edition: _z9783030912956 |
830 | 0 |
_aComputational Methods in Applied Sciences, _x2543-0203 ; _v56 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-91293-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c179200 _d179200 |